ISMS Policy
The Disrupt Labs is committed to maintaining the highest standards of information security to ensure the uninterrupted delivery of our innovative software solutions in Computer Vision and Artificial Intelligence for Industrial Safety and Quality. This policy outlines our approach to managing information security and is designed to support our mission by protecting the confidentiality, integrity, and availability of information assets.
This policy applies to all employees, contractors, and third-party service providers who have access to The Disrupt Labs’ information assets and systems.
The Disrupt Labs manages information security controls with the help of its Statement of Applicability (SOA) document. These applicable security controls are driven by business needs and are regularly communicated to all staff through team meetings.
In alignment with our commitment to the International Standard for Information Security, ISO/IEC 27001: 2022.The Disrupt Labs has established information security objectives that ensures the sensitive information is accessible only to authorised individuals. Maintain the accuracy and completeness of information and processing methods. Guarantee that information and resources are available when needed by authorised users. Meet applicable legal, regulatory, and contractual requirements related to information security while managing associated risks effectively.
The Disrupt Labs provides the necessary resources for the effective implementation and maintenance of our Information Security Management System (ISMS). Ensuring that our staff are trained and informed about their roles in maintaining information security. Investing in advanced technologies and tools to protect our information assets. Developing and maintaining processes and procedures that support our information security objectives.
We are committed to continual improvement by reviewing and redefining information security objectives on an annual basis. Gathering improvement ideas from customers, suppliers, risk assessments, and audit reports. Making necessary adjustments to our information security controls and processes based on the feedback and emerging risks.